 |
Index for Section 8 |
|
 |
Alphabetical listing for D |
|
 |
Bottom of page |
|
db_checkpoint(8)
NAME
db_checkpoint - Periodically checkpoint the security database log (Enhanced
Security)
SYNOPSIS
/usr/tcb/bin/db_checkpoint [-1v] [-h home] [-k bytes] [-L file] [-p min]
OPTIONS
-1 Checkpoint the log once, and then exit.
-h home
Specify a home directory for the database. The correct directory for
enhanced security is /var/tcb/files.
-k kbytes
Checkpoint the database at least as often as every kbytes of log file
written.
-l file
Log the execution of the db_checkpoint utility to the specified file in
the following format, where ### is the process ID, and the date is the
time the utility starting running.
db_checkpoint: ### Wed Jun 15 01:23:45 EDT 1995
This file is removed if the db_checkpoint utility exits gracefully.
-p min
Checkpoint the database at least every min minutes.
-v Write the time of each checkpoint to the standard output.
At least one of the -1, -k and -p options must be specified.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in
the operating system to provide high-performance database support for
critical security files. The DB includes full transactional support and
database recovery, using write-ahead logging and checkpointing to record
changes.
The db_checkpoint utility is a daemon process that monitors the database
log and periodically checkpoints it. Since other database functions also
cause checkpoint records to be written to the log, db_checkpoint is
normally used as a one-time function to guarantee a checkpoint before
archiving the database.
The db_checkpoint utility utility attaches to one or more of the Berkeley
DB shared memory regions. In order to avoid region corruption, it should
always be given the chance to detach and exit gracefully. To cause
db_checkpoint to clean up after itself and exit, send it an interrupt
signal (SIGINT).
The db_checkpoint utility does not attempt to create the Berkeley DB shared
memory regions if they do not already exist. The application which creates
the region should be started first, and then, once the region is created,
the db_checkpoint utility should be started.
RETURN VALUES
The db_checkpoint utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
DB_HOME
If the -h option is not specified and the environment variable DB_HOME
is set, it is used as the path of the database home. The home directory
for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
SEE ALSO
Commands: db_archive(8), db_printlog(8), db_recover(8), db_stat(8),
secconfig(8)
 |
Index for Section 8 |
|
 |
Alphabetical listing for D |
|
 |
Top of page |
|